Several apps with same backend name in Marathon.

This commit is contained in:
Ludovic Fernandez 2018-04-04 12:28:03 +02:00 committed by Traefiker Bot
parent 6845068b82
commit 88b71d23db
6 changed files with 367 additions and 278 deletions

View file

@ -1490,8 +1490,7 @@ func templatesMarathonV1Tmpl() (*asset, error) {
var _templatesMarathonTmpl = []byte(`{{ $apps := .Applications }} var _templatesMarathonTmpl = []byte(`{{ $apps := .Applications }}
[backends] [backends]
{{range $app := $apps }} {{range $backendName, $app := $apps }}
{{ $backendName := getBackendName $app }}
[backends."{{ $backendName }}"] [backends."{{ $backendName }}"]
@ -1546,11 +1545,11 @@ var _templatesMarathonTmpl = []byte(`{{ $apps := .Applications }}
{{end}} {{end}}
[frontends] [frontends]
{{range $app := $apps }} {{range $backendName, $app := $apps }}
{{ $frontendName := getFrontendName $app }} {{ $frontendName := getFrontendName $app }}
[frontends."{{ $frontendName }}"] [frontends."{{ $frontendName }}"]
backend = "{{ getBackendName $app }}" backend = "{{ $backendName }}"
priority = {{ getPriority $app.SegmentLabels }} priority = {{ getPriority $app.SegmentLabels }}
passHostHeader = {{ getPassHostHeader $app.SegmentLabels }} passHostHeader = {{ getPassHostHeader $app.SegmentLabels }}
passTLSCert = {{ getPassTLSCert $app.SegmentLabels }} passTLSCert = {{ getPassTLSCert $app.SegmentLabels }}

View file

@ -54,14 +54,14 @@ func constraint(value string) func(*marathon.Application) {
} }
} }
func withServiceLabel(key, value string, serviceName string) func(*marathon.Application) { func withSegmentLabel(key, value string, segmentName string) func(*marathon.Application) {
if len(serviceName) == 0 { if len(segmentName) == 0 {
panic("serviceName can not be empty") panic("segmentName can not be empty")
} }
property := strings.TrimPrefix(key, label.Prefix) property := strings.TrimPrefix(key, label.Prefix)
return func(app *marathon.Application) { return func(app *marathon.Application) {
app.AddLabel(label.Prefix+serviceName+"."+property, value) app.AddLabel(label.Prefix+segmentName+"."+property, value)
} }
} }
@ -152,6 +152,7 @@ func localhostTask(ops ...func(*marathon.Task)) marathon.Task {
t := task( t := task(
host("localhost"), host("localhost"),
ipAddresses("127.0.0.1"), ipAddresses("127.0.0.1"),
taskState(taskStateRunning),
) )
for _, op := range ops { for _, op := range ops {
@ -167,6 +168,12 @@ func taskPorts(ports ...int) func(*marathon.Task) {
} }
} }
func taskState(state TaskState) func(*marathon.Task) {
return func(t *marathon.Task) {
t.State = string(state)
}
}
func host(h string) func(*marathon.Task) { func host(h string) func(*marathon.Task) {
return func(t *marathon.Task) { return func(t *marathon.Task) {
t.Host = h t.Host = h
@ -184,12 +191,6 @@ func ipAddresses(addresses ...string) func(*marathon.Task) {
} }
} }
func state(s TaskState) func(*marathon.Task) {
return func(t *marathon.Task) {
t.State = string(s)
}
}
func startedAt(timestamp string) func(*marathon.Task) { func startedAt(timestamp string) func(*marathon.Task) {
return func(t *marathon.Task) { return func(t *marathon.Task) {
t.StartedAt = timestamp t.StartedAt = timestamp

View file

@ -21,6 +21,7 @@ type appData struct {
marathon.Application marathon.Application
SegmentLabels map[string]string SegmentLabels map[string]string
SegmentName string SegmentName string
LinkedApps []*appData
} }
func (p *Provider) buildConfigurationV2(applications *marathon.Applications) *types.Configuration { func (p *Provider) buildConfigurationV2(applications *marathon.Applications) *types.Configuration {
@ -54,7 +55,7 @@ func (p *Provider) buildConfigurationV2(applications *marathon.Applications) *ty
"getWhiteList": label.GetWhiteList, "getWhiteList": label.GetWhiteList,
} }
var apps []*appData apps := make(map[string]*appData)
for _, app := range applications.Apps { for _, app := range applications.Apps {
if p.applicationFilter(app) { if p.applicationFilter(app) {
// Tasks // Tasks
@ -66,10 +67,6 @@ func (p *Provider) buildConfigurationV2(applications *marathon.Applications) *ty
} }
} }
if len(filteredTasks) == 0 {
log.Warnf("No valid tasks for application %s", app.ID)
continue
}
app.Tasks = filteredTasks app.Tasks = filteredTasks
// segments // segments
@ -80,13 +77,19 @@ func (p *Provider) buildConfigurationV2(applications *marathon.Applications) *ty
SegmentLabels: labels, SegmentLabels: labels,
SegmentName: segmentName, SegmentName: segmentName,
} }
apps = append(apps, data)
backendName := p.getBackendName(*data)
if baseApp, ok := apps[backendName]; ok {
baseApp.LinkedApps = append(baseApp.LinkedApps, data)
} else {
apps[backendName] = data
}
} }
} }
} }
templateObjects := struct { templateObjects := struct {
Applications []*appData Applications map[string]*appData
Domain string Domain string
}{ }{
Applications: apps, Applications: apps,
@ -181,11 +184,11 @@ func (p *Provider) getSubDomain(name string) string {
} }
func (p *Provider) getBackendName(app appData) string { func (p *Provider) getBackendName(app appData) string {
value := label.GetStringValue(app.SegmentLabels, label.TraefikBackend, "") value := label.GetStringValue(app.SegmentLabels, label.TraefikBackend, "")
if len(value) > 0 { if len(value) > 0 {
return provider.Normalize("backend" + value) return provider.Normalize("backend" + value)
} }
return provider.Normalize("backend" + app.ID + getSegmentNameSuffix(app.SegmentName)) return provider.Normalize("backend" + app.ID + getSegmentNameSuffix(app.SegmentName))
} }
@ -291,8 +294,9 @@ func (p *Provider) getServers(app appData) map[string]types.Server {
var servers map[string]types.Server var servers map[string]types.Server
for _, task := range app.Tasks { for _, task := range app.Tasks {
host := p.getBackendServer(*task, app) name, server, err := p.getServer(app, *task)
if len(host) == 0 { if err != nil {
log.Error(err)
continue continue
} }
@ -300,45 +304,68 @@ func (p *Provider) getServers(app appData) map[string]types.Server {
servers = make(map[string]types.Server) servers = make(map[string]types.Server)
} }
port := getPort(*task, app) servers[name] = *server
protocol := label.GetStringValue(app.SegmentLabels, label.TraefikProtocol, label.DefaultProtocol) }
serverName := provider.Normalize("server-" + task.ID + getSegmentNameSuffix(app.SegmentName)) for _, linkedApp := range app.LinkedApps {
servers[serverName] = types.Server{ for _, task := range linkedApp.Tasks {
URL: fmt.Sprintf("%s://%s:%v", protocol, host, port), name, server, err := p.getServer(*linkedApp, *task)
Weight: label.GetIntValue(app.SegmentLabels, label.TraefikWeight, label.DefaultWeightInt), if err != nil {
log.Error(err)
continue
}
if servers == nil {
servers = make(map[string]types.Server)
}
servers[name] = *server
} }
} }
return servers return servers
} }
func (p *Provider) getBackendServer(task marathon.Task, app appData) string { func (p *Provider) getServer(app appData, task marathon.Task) (string, *types.Server, error) {
host, err := p.getServerHost(task, app)
if len(host) == 0 {
return "", nil, err
}
port := getPort(task, app)
protocol := label.GetStringValue(app.SegmentLabels, label.TraefikProtocol, label.DefaultProtocol)
serverName := provider.Normalize("server-" + app.ID + "-" + task.ID + getSegmentNameSuffix(app.SegmentName))
return serverName, &types.Server{
URL: fmt.Sprintf("%s://%s:%v", protocol, host, port),
Weight: label.GetIntValue(app.SegmentLabels, label.TraefikWeight, label.DefaultWeightInt),
}, nil
}
func (p *Provider) getServerHost(task marathon.Task, app appData) (string, error) {
if app.IPAddressPerTask == nil || p.ForceTaskHostname { if app.IPAddressPerTask == nil || p.ForceTaskHostname {
return task.Host return task.Host, nil
} }
numTaskIPAddresses := len(task.IPAddresses) numTaskIPAddresses := len(task.IPAddresses)
switch numTaskIPAddresses { switch numTaskIPAddresses {
case 0: case 0:
log.Errorf("Missing IP address for Marathon application %s on task %s", app.ID, task.ID) return "", fmt.Errorf("missing IP address for Marathon application %s on task %s", app.ID, task.ID)
return ""
case 1: case 1:
return task.IPAddresses[0].IPAddress return task.IPAddresses[0].IPAddress, nil
default: default:
ipAddressIdx := label.GetIntValue(stringValueMap(app.Labels), labelIPAddressIdx, math.MinInt32) ipAddressIdx := label.GetIntValue(stringValueMap(app.Labels), labelIPAddressIdx, math.MinInt32)
if ipAddressIdx == math.MinInt32 { if ipAddressIdx == math.MinInt32 {
log.Errorf("Found %d task IP addresses but missing IP address index for Marathon application %s on task %s", return "", fmt.Errorf("found %d task IP addresses but missing IP address index for Marathon application %s on task %s",
numTaskIPAddresses, app.ID, task.ID) numTaskIPAddresses, app.ID, task.ID)
return ""
} }
if ipAddressIdx < 0 || ipAddressIdx > numTaskIPAddresses { if ipAddressIdx < 0 || ipAddressIdx > numTaskIPAddresses {
log.Errorf("Cannot use IP address index to select from %d task IP addresses for Marathon application %s on task %s", return "", fmt.Errorf("cannot use IP address index to select from %d task IP addresses for Marathon application %s on task %s",
numTaskIPAddresses, app.ID, task.ID) numTaskIPAddresses, app.ID, task.ID)
return ""
} }
return task.IPAddresses[ipAddressIdx].IPAddress return task.IPAddresses[ipAddressIdx].IPAddress, nil
} }
} }

View file

@ -30,22 +30,24 @@ func TestGetConfigurationAPIErrors(t *testing.T) {
func TestBuildConfiguration(t *testing.T) { func TestBuildConfiguration(t *testing.T) {
testCases := []struct { testCases := []struct {
desc string desc string
application marathon.Application applications *marathon.Applications
expectedFrontends map[string]*types.Frontend expectedFrontends map[string]*types.Frontend
expectedBackends map[string]*types.Backend expectedBackends map[string]*types.Backend
}{ }{
{ {
desc: "simple application", desc: "simple application",
application: application( applications: withApplications(
application(
appID("/app"),
appPorts(80), appPorts(80),
withTasks(localhostTask(taskPorts(80))), withTasks(localhostTask(taskPorts(80))),
), )),
expectedFrontends: map[string]*types.Frontend{ expectedFrontends: map[string]*types.Frontend{
"frontend-app": { "frontend-app": {
Backend: "backend-app", Backend: "backend-app",
Routes: map[string]types.Route{ Routes: map[string]types.Route{
"route-host-app": { "route-host-app": {
Rule: "Host:app.docker.localhost", Rule: "Host:app.marathon.localhost",
}, },
}, },
PassHostHeader: true, PassHostHeader: true,
@ -56,7 +58,7 @@ func TestBuildConfiguration(t *testing.T) {
expectedBackends: map[string]*types.Backend{ expectedBackends: map[string]*types.Backend{
"backend-app": { "backend-app": {
Servers: map[string]types.Server{ Servers: map[string]types.Server{
"server-task": { "server-app-taskID": {
URL: "http://localhost:80", URL: "http://localhost:80",
Weight: 0, Weight: 0,
}, },
@ -67,27 +69,44 @@ func TestBuildConfiguration(t *testing.T) {
}, },
{ {
desc: "filtered task", desc: "filtered task",
application: application( applications: withApplications(
application(
appID("/app"),
appPorts(80), appPorts(80),
withTasks(localhostTask(taskPorts(80), state(taskStateStaging))), withTasks(localhostTask(taskPorts(80), taskState(taskStateStaging))),
), )),
expectedFrontends: map[string]*types.Frontend{},
expectedBackends: map[string]*types.Backend{},
},
{
desc: "max connection extractor function label only",
application: application(
appPorts(80),
withTasks(localhostTask(taskPorts(80))),
withLabel(label.TraefikBackendMaxConnExtractorFunc, "client.ip"),
),
expectedFrontends: map[string]*types.Frontend{ expectedFrontends: map[string]*types.Frontend{
"frontend-app": { "frontend-app": {
Backend: "backend-app", Backend: "backend-app",
Routes: map[string]types.Route{ Routes: map[string]types.Route{
"route-host-app": { "route-host-app": {
Rule: "Host:app.docker.localhost", Rule: "Host:app.marathon.localhost",
},
},
PassHostHeader: true,
BasicAuth: []string{},
EntryPoints: []string{},
},
},
expectedBackends: map[string]*types.Backend{
"backend-app": {},
},
},
{
desc: "max connection extractor function label only",
applications: withApplications(application(
appID("/app"),
appPorts(80),
withTasks(localhostTask(taskPorts(80))),
withLabel(label.TraefikBackendMaxConnExtractorFunc, "client.ip"),
)),
expectedFrontends: map[string]*types.Frontend{
"frontend-app": {
Backend: "backend-app",
Routes: map[string]types.Route{
"route-host-app": {
Rule: "Host:app.marathon.localhost",
}, },
}, },
PassHostHeader: true, PassHostHeader: true,
@ -98,7 +117,7 @@ func TestBuildConfiguration(t *testing.T) {
expectedBackends: map[string]*types.Backend{ expectedBackends: map[string]*types.Backend{
"backend-app": { "backend-app": {
Servers: map[string]types.Server{ Servers: map[string]types.Server{
"server-task": { "server-app-taskID": {
URL: "http://localhost:80", URL: "http://localhost:80",
Weight: 0, Weight: 0,
}, },
@ -109,16 +128,18 @@ func TestBuildConfiguration(t *testing.T) {
}, },
{ {
desc: "multiple ports", desc: "multiple ports",
application: application( applications: withApplications(
application(
appID("/app"),
appPorts(80, 81), appPorts(80, 81),
withTasks(localhostTask(taskPorts(80, 81))), withTasks(localhostTask(taskPorts(80, 81))),
), )),
expectedFrontends: map[string]*types.Frontend{ expectedFrontends: map[string]*types.Frontend{
"frontend-app": { "frontend-app": {
Backend: "backend-app", Backend: "backend-app",
Routes: map[string]types.Route{ Routes: map[string]types.Route{
"route-host-app": { "route-host-app": {
Rule: "Host:app.docker.localhost", Rule: "Host:app.marathon.localhost",
}, },
}, },
PassHostHeader: true, PassHostHeader: true,
@ -129,7 +150,7 @@ func TestBuildConfiguration(t *testing.T) {
expectedBackends: map[string]*types.Backend{ expectedBackends: map[string]*types.Backend{
"backend-app": { "backend-app": {
Servers: map[string]types.Server{ Servers: map[string]types.Server{
"server-task": { "server-app-taskID": {
URL: "http://localhost:80", URL: "http://localhost:80",
Weight: 0, Weight: 0,
}, },
@ -139,9 +160,11 @@ func TestBuildConfiguration(t *testing.T) {
}, },
{ {
desc: "with all labels", desc: "with all labels",
application: application( applications: withApplications(
application(
appID("/app"),
appPorts(80), appPorts(80),
withTasks(task(host("127.0.0.1"), taskPorts(80))), withTasks(task(host("127.0.0.1"), taskPorts(80), taskState(taskStateRunning))),
withLabel(label.TraefikPort, "666"), withLabel(label.TraefikPort, "666"),
withLabel(label.TraefikProtocol, "https"), withLabel(label.TraefikProtocol, "https"),
@ -214,7 +237,7 @@ func TestBuildConfiguration(t *testing.T) {
withLabel(label.Prefix+label.BaseFrontendRateLimit+"bar."+label.SuffixRateLimitPeriod, "3"), withLabel(label.Prefix+label.BaseFrontendRateLimit+"bar."+label.SuffixRateLimitPeriod, "3"),
withLabel(label.Prefix+label.BaseFrontendRateLimit+"bar."+label.SuffixRateLimitAverage, "6"), withLabel(label.Prefix+label.BaseFrontendRateLimit+"bar."+label.SuffixRateLimitAverage, "6"),
withLabel(label.Prefix+label.BaseFrontendRateLimit+"bar."+label.SuffixRateLimitBurst, "9"), withLabel(label.Prefix+label.BaseFrontendRateLimit+"bar."+label.SuffixRateLimitBurst, "9"),
), )),
expectedFrontends: map[string]*types.Frontend{ expectedFrontends: map[string]*types.Frontend{
"frontend-app": { "frontend-app": {
EntryPoints: []string{ EntryPoints: []string{
@ -319,7 +342,7 @@ func TestBuildConfiguration(t *testing.T) {
expectedBackends: map[string]*types.Backend{ expectedBackends: map[string]*types.Backend{
"backendfoobar": { "backendfoobar": {
Servers: map[string]types.Server{ Servers: map[string]types.Server{
"server-task": { "server-app-taskID": {
URL: "https://127.0.0.1:666", URL: "https://127.0.0.1:666",
Weight: 12, Weight: 12,
}, },
@ -353,6 +376,60 @@ func TestBuildConfiguration(t *testing.T) {
}, },
}, },
}, },
{
desc: "2 applications with the same backend name",
applications: withApplications(
application(
appID("/foo-v000"),
withTasks(localhostTask(taskPorts(8080))),
withLabel("traefik.main.backend", "test.foo"),
withLabel("traefik.main.protocol", "http"),
withLabel("traefik.protocol", "http"),
withLabel("traefik.main.portIndex", "0"),
withLabel("traefik.enable", "true"),
withLabel("traefik.main.frontend.rule", "Host:app.marathon.localhost"),
),
application(
appID("/foo-v001"),
withTasks(localhostTask(taskPorts(8081))),
withLabel("traefik.main.backend", "test.foo"),
withLabel("traefik.main.protocol", "http"),
withLabel("traefik.protocol", "http"),
withLabel("traefik.main.portIndex", "0"),
withLabel("traefik.enable", "true"),
withLabel("traefik.main.frontend.rule", "Host:app.marathon.localhost"),
),
),
expectedFrontends: map[string]*types.Frontend{
"frontend-foo-v000-service-main": {
EntryPoints: []string{},
Backend: "backendtest-foo",
Routes: map[string]types.Route{
"route-host-foo-v000-service-main": {
Rule: "Host:app.marathon.localhost",
},
},
PassHostHeader: true,
BasicAuth: []string{},
},
},
expectedBackends: map[string]*types.Backend{
"backendtest-foo": {
Servers: map[string]types.Server{
"server-foo-v000-taskID-service-main": {
URL: "http://localhost:8080",
Weight: 0,
},
"server-foo-v001-taskID-service-main": {
URL: "http://localhost:8081",
Weight: 0,
},
},
},
},
},
} }
for _, test := range testCases { for _, test := range testCases {
@ -360,21 +437,12 @@ func TestBuildConfiguration(t *testing.T) {
t.Run(test.desc, func(t *testing.T) { t.Run(test.desc, func(t *testing.T) {
t.Parallel() t.Parallel()
test.application.ID = "/app"
for _, task := range test.application.Tasks {
task.ID = "task"
if task.State == "" {
task.State = "TASK_RUNNING"
}
}
p := &Provider{ p := &Provider{
Domain: "docker.localhost", Domain: "marathon.localhost",
ExposedByDefault: true, ExposedByDefault: true,
} }
actualConfig := p.buildConfigurationV2(withApplications(test.application)) actualConfig := p.buildConfigurationV2(test.applications)
assert.NotNil(t, actualConfig) assert.NotNil(t, actualConfig)
assert.Equal(t, test.expectedBackends, actualConfig.Backends) assert.Equal(t, test.expectedBackends, actualConfig.Backends)
@ -383,33 +451,35 @@ func TestBuildConfiguration(t *testing.T) {
} }
} }
func TestBuildConfigurationServices(t *testing.T) { func TestBuildConfigurationSegments(t *testing.T) {
testCases := []struct { testCases := []struct {
desc string desc string
application marathon.Application applications *marathon.Applications
expectedFrontends map[string]*types.Frontend expectedFrontends map[string]*types.Frontend
expectedBackends map[string]*types.Backend expectedBackends map[string]*types.Backend
}{ }{
{ {
desc: "multiple ports with services", desc: "multiple ports with segments",
application: application( applications: withApplications(
application(
appID("/app"),
appPorts(80, 81), appPorts(80, 81),
withTasks(localhostTask(taskPorts(80, 81))), withTasks(localhostTask(taskPorts(80, 81))),
withLabel(label.TraefikBackendMaxConnAmount, "1000"), withLabel(label.TraefikBackendMaxConnAmount, "1000"),
withLabel(label.TraefikBackendMaxConnExtractorFunc, "client.ip"), withLabel(label.TraefikBackendMaxConnExtractorFunc, "client.ip"),
withServiceLabel(label.TraefikPort, "80", "web"), withSegmentLabel(label.TraefikPort, "80", "web"),
withServiceLabel(label.TraefikPort, "81", "admin"), withSegmentLabel(label.TraefikPort, "81", "admin"),
withLabel("traefik..port", "82"), // This should be ignored, as it fails to match the segmentPropertiesRegexp regex. withLabel("traefik..port", "82"), // This should be ignored, as it fails to match the segmentPropertiesRegexp regex.
withServiceLabel(label.TraefikFrontendRule, "Host:web.app.docker.localhost", "web"), withSegmentLabel(label.TraefikFrontendRule, "Host:web.app.marathon.localhost", "web"),
withServiceLabel(label.TraefikFrontendRule, "Host:admin.app.docker.localhost", "admin"), withSegmentLabel(label.TraefikFrontendRule, "Host:admin.app.marathon.localhost", "admin"),
), )),
expectedFrontends: map[string]*types.Frontend{ expectedFrontends: map[string]*types.Frontend{
"frontend-app-service-web": { "frontend-app-service-web": {
Backend: "backend-app-service-web", Backend: "backend-app-service-web",
Routes: map[string]types.Route{ Routes: map[string]types.Route{
`route-host-app-service-web`: { `route-host-app-service-web`: {
Rule: "Host:web.app.docker.localhost", Rule: "Host:web.app.marathon.localhost",
}, },
}, },
PassHostHeader: true, PassHostHeader: true,
@ -420,7 +490,7 @@ func TestBuildConfigurationServices(t *testing.T) {
Backend: "backend-app-service-admin", Backend: "backend-app-service-admin",
Routes: map[string]types.Route{ Routes: map[string]types.Route{
`route-host-app-service-admin`: { `route-host-app-service-admin`: {
Rule: "Host:admin.app.docker.localhost", Rule: "Host:admin.app.marathon.localhost",
}, },
}, },
PassHostHeader: true, PassHostHeader: true,
@ -431,7 +501,7 @@ func TestBuildConfigurationServices(t *testing.T) {
expectedBackends: map[string]*types.Backend{ expectedBackends: map[string]*types.Backend{
"backend-app-service-web": { "backend-app-service-web": {
Servers: map[string]types.Server{ Servers: map[string]types.Server{
"server-task-service-web": { "server-app-taskID-service-web": {
URL: "http://localhost:80", URL: "http://localhost:80",
Weight: 0, Weight: 0,
}, },
@ -443,7 +513,7 @@ func TestBuildConfigurationServices(t *testing.T) {
}, },
"backend-app-service-admin": { "backend-app-service-admin": {
Servers: map[string]types.Server{ Servers: map[string]types.Server{
"server-task-service-admin": { "server-app-taskID-service-admin": {
URL: "http://localhost:81", URL: "http://localhost:81",
Weight: 0, Weight: 0,
}, },
@ -457,7 +527,9 @@ func TestBuildConfigurationServices(t *testing.T) {
}, },
{ {
desc: "when all labels are set", desc: "when all labels are set",
application: application( applications: withApplications(
application(
appID("/app"),
appPorts(80, 81), appPorts(80, 81),
withTasks(localhostTask(taskPorts(80, 81))), withTasks(localhostTask(taskPorts(80, 81))),
@ -479,44 +551,44 @@ func TestBuildConfigurationServices(t *testing.T) {
withLabel(label.TraefikBackendBufferingMemRequestBodyBytes, "2097152"), withLabel(label.TraefikBackendBufferingMemRequestBodyBytes, "2097152"),
withLabel(label.TraefikBackendBufferingRetryExpression, "IsNetworkError() && Attempts() <= 2"), withLabel(label.TraefikBackendBufferingRetryExpression, "IsNetworkError() && Attempts() <= 2"),
withServiceLabel(label.TraefikPort, "80", "containous"), withSegmentLabel(label.TraefikPort, "80", "containous"),
withServiceLabel(label.TraefikProtocol, "https", "containous"), withSegmentLabel(label.TraefikProtocol, "https", "containous"),
withServiceLabel(label.TraefikWeight, "12", "containous"), withSegmentLabel(label.TraefikWeight, "12", "containous"),
withServiceLabel(label.TraefikFrontendAuthBasic, "test:$apr1$H6uskkkW$IgXLP6ewTrSuBkTrqE8wj/,test2:$apr1$d9hr9HBB$4HxwgUir3HP4EsggP/QNo0", "containous"), withSegmentLabel(label.TraefikFrontendAuthBasic, "test:$apr1$H6uskkkW$IgXLP6ewTrSuBkTrqE8wj/,test2:$apr1$d9hr9HBB$4HxwgUir3HP4EsggP/QNo0", "containous"),
withServiceLabel(label.TraefikFrontendEntryPoints, "http,https", "containous"), withSegmentLabel(label.TraefikFrontendEntryPoints, "http,https", "containous"),
withServiceLabel(label.TraefikFrontendPassHostHeader, "true", "containous"), withSegmentLabel(label.TraefikFrontendPassHostHeader, "true", "containous"),
withServiceLabel(label.TraefikFrontendPassTLSCert, "true", "containous"), withSegmentLabel(label.TraefikFrontendPassTLSCert, "true", "containous"),
withServiceLabel(label.TraefikFrontendPriority, "666", "containous"), withSegmentLabel(label.TraefikFrontendPriority, "666", "containous"),
withServiceLabel(label.TraefikFrontendRedirectEntryPoint, "https", "containous"), withSegmentLabel(label.TraefikFrontendRedirectEntryPoint, "https", "containous"),
withServiceLabel(label.TraefikFrontendRedirectRegex, "nope", "containous"), withSegmentLabel(label.TraefikFrontendRedirectRegex, "nope", "containous"),
withServiceLabel(label.TraefikFrontendRedirectReplacement, "nope", "containous"), withSegmentLabel(label.TraefikFrontendRedirectReplacement, "nope", "containous"),
withServiceLabel(label.TraefikFrontendRedirectPermanent, "true", "containous"), withSegmentLabel(label.TraefikFrontendRedirectPermanent, "true", "containous"),
withServiceLabel(label.TraefikFrontendRule, "Host:traefik.io", "containous"), withSegmentLabel(label.TraefikFrontendRule, "Host:traefik.io", "containous"),
withServiceLabel(label.TraefikFrontendWhiteListSourceRange, "10.10.10.10", "containous"), withSegmentLabel(label.TraefikFrontendWhiteListSourceRange, "10.10.10.10", "containous"),
withServiceLabel(label.TraefikFrontendWhiteListUseXForwardedFor, "true", "containous"), withSegmentLabel(label.TraefikFrontendWhiteListUseXForwardedFor, "true", "containous"),
withServiceLabel(label.TraefikFrontendRequestHeaders, "Access-Control-Allow-Methods:POST,GET,OPTIONS || Content-type: application/json; charset=utf-8", "containous"), withSegmentLabel(label.TraefikFrontendRequestHeaders, "Access-Control-Allow-Methods:POST,GET,OPTIONS || Content-type: application/json; charset=utf-8", "containous"),
withServiceLabel(label.TraefikFrontendResponseHeaders, "Access-Control-Allow-Methods:POST,GET,OPTIONS || Content-type: application/json; charset=utf-8", "containous"), withSegmentLabel(label.TraefikFrontendResponseHeaders, "Access-Control-Allow-Methods:POST,GET,OPTIONS || Content-type: application/json; charset=utf-8", "containous"),
withServiceLabel(label.TraefikFrontendSSLProxyHeaders, "Access-Control-Allow-Methods:POST,GET,OPTIONS || Content-type: application/json; charset=utf-8", "containous"), withSegmentLabel(label.TraefikFrontendSSLProxyHeaders, "Access-Control-Allow-Methods:POST,GET,OPTIONS || Content-type: application/json; charset=utf-8", "containous"),
withServiceLabel(label.TraefikFrontendAllowedHosts, "foo,bar,bor", "containous"), withSegmentLabel(label.TraefikFrontendAllowedHosts, "foo,bar,bor", "containous"),
withServiceLabel(label.TraefikFrontendHostsProxyHeaders, "foo,bar,bor", "containous"), withSegmentLabel(label.TraefikFrontendHostsProxyHeaders, "foo,bar,bor", "containous"),
withServiceLabel(label.TraefikFrontendSSLHost, "foo", "containous"), withSegmentLabel(label.TraefikFrontendSSLHost, "foo", "containous"),
withServiceLabel(label.TraefikFrontendCustomFrameOptionsValue, "foo", "containous"), withSegmentLabel(label.TraefikFrontendCustomFrameOptionsValue, "foo", "containous"),
withServiceLabel(label.TraefikFrontendContentSecurityPolicy, "foo", "containous"), withSegmentLabel(label.TraefikFrontendContentSecurityPolicy, "foo", "containous"),
withServiceLabel(label.TraefikFrontendPublicKey, "foo", "containous"), withSegmentLabel(label.TraefikFrontendPublicKey, "foo", "containous"),
withServiceLabel(label.TraefikFrontendReferrerPolicy, "foo", "containous"), withSegmentLabel(label.TraefikFrontendReferrerPolicy, "foo", "containous"),
withServiceLabel(label.TraefikFrontendCustomBrowserXSSValue, "foo", "containous"), withSegmentLabel(label.TraefikFrontendCustomBrowserXSSValue, "foo", "containous"),
withServiceLabel(label.TraefikFrontendSTSSeconds, "666", "containous"), withSegmentLabel(label.TraefikFrontendSTSSeconds, "666", "containous"),
withServiceLabel(label.TraefikFrontendSSLRedirect, "true", "containous"), withSegmentLabel(label.TraefikFrontendSSLRedirect, "true", "containous"),
withServiceLabel(label.TraefikFrontendSSLTemporaryRedirect, "true", "containous"), withSegmentLabel(label.TraefikFrontendSSLTemporaryRedirect, "true", "containous"),
withServiceLabel(label.TraefikFrontendSTSIncludeSubdomains, "true", "containous"), withSegmentLabel(label.TraefikFrontendSTSIncludeSubdomains, "true", "containous"),
withServiceLabel(label.TraefikFrontendSTSPreload, "true", "containous"), withSegmentLabel(label.TraefikFrontendSTSPreload, "true", "containous"),
withServiceLabel(label.TraefikFrontendForceSTSHeader, "true", "containous"), withSegmentLabel(label.TraefikFrontendForceSTSHeader, "true", "containous"),
withServiceLabel(label.TraefikFrontendFrameDeny, "true", "containous"), withSegmentLabel(label.TraefikFrontendFrameDeny, "true", "containous"),
withServiceLabel(label.TraefikFrontendContentTypeNosniff, "true", "containous"), withSegmentLabel(label.TraefikFrontendContentTypeNosniff, "true", "containous"),
withServiceLabel(label.TraefikFrontendBrowserXSSFilter, "true", "containous"), withSegmentLabel(label.TraefikFrontendBrowserXSSFilter, "true", "containous"),
withServiceLabel(label.TraefikFrontendIsDevelopment, "true", "containous"), withSegmentLabel(label.TraefikFrontendIsDevelopment, "true", "containous"),
withLabel(label.Prefix+"containous."+label.BaseFrontendErrorPage+"foo."+label.SuffixErrorPageStatus, "404"), withLabel(label.Prefix+"containous."+label.BaseFrontendErrorPage+"foo."+label.SuffixErrorPageStatus, "404"),
withLabel(label.Prefix+"containous."+label.BaseFrontendErrorPage+"foo."+label.SuffixErrorPageBackend, "foobar"), withLabel(label.Prefix+"containous."+label.BaseFrontendErrorPage+"foo."+label.SuffixErrorPageBackend, "foobar"),
@ -525,14 +597,14 @@ func TestBuildConfigurationServices(t *testing.T) {
withLabel(label.Prefix+"containous."+label.BaseFrontendErrorPage+"bar."+label.SuffixErrorPageBackend, "foobar"), withLabel(label.Prefix+"containous."+label.BaseFrontendErrorPage+"bar."+label.SuffixErrorPageBackend, "foobar"),
withLabel(label.Prefix+"containous."+label.BaseFrontendErrorPage+"bar."+label.SuffixErrorPageQuery, "bar_query"), withLabel(label.Prefix+"containous."+label.BaseFrontendErrorPage+"bar."+label.SuffixErrorPageQuery, "bar_query"),
withServiceLabel(label.TraefikFrontendRateLimitExtractorFunc, "client.ip", "containous"), withSegmentLabel(label.TraefikFrontendRateLimitExtractorFunc, "client.ip", "containous"),
withLabel(label.Prefix+"containous."+label.BaseFrontendRateLimit+"foo."+label.SuffixRateLimitPeriod, "6"), withLabel(label.Prefix+"containous."+label.BaseFrontendRateLimit+"foo."+label.SuffixRateLimitPeriod, "6"),
withLabel(label.Prefix+"containous."+label.BaseFrontendRateLimit+"foo."+label.SuffixRateLimitAverage, "12"), withLabel(label.Prefix+"containous."+label.BaseFrontendRateLimit+"foo."+label.SuffixRateLimitAverage, "12"),
withLabel(label.Prefix+"containous."+label.BaseFrontendRateLimit+"foo."+label.SuffixRateLimitBurst, "18"), withLabel(label.Prefix+"containous."+label.BaseFrontendRateLimit+"foo."+label.SuffixRateLimitBurst, "18"),
withLabel(label.Prefix+"containous."+label.BaseFrontendRateLimit+"bar."+label.SuffixRateLimitPeriod, "3"), withLabel(label.Prefix+"containous."+label.BaseFrontendRateLimit+"bar."+label.SuffixRateLimitPeriod, "3"),
withLabel(label.Prefix+"containous."+label.BaseFrontendRateLimit+"bar."+label.SuffixRateLimitAverage, "6"), withLabel(label.Prefix+"containous."+label.BaseFrontendRateLimit+"bar."+label.SuffixRateLimitAverage, "6"),
withLabel(label.Prefix+"containous."+label.BaseFrontendRateLimit+"bar."+label.SuffixRateLimitBurst, "9"), withLabel(label.Prefix+"containous."+label.BaseFrontendRateLimit+"bar."+label.SuffixRateLimitBurst, "9"),
), )),
expectedFrontends: map[string]*types.Frontend{ expectedFrontends: map[string]*types.Frontend{
"frontend-app-service-containous": { "frontend-app-service-containous": {
EntryPoints: []string{ EntryPoints: []string{
@ -637,7 +709,7 @@ func TestBuildConfigurationServices(t *testing.T) {
expectedBackends: map[string]*types.Backend{ expectedBackends: map[string]*types.Backend{
"backend-app-service-containous": { "backend-app-service-containous": {
Servers: map[string]types.Server{ Servers: map[string]types.Server{
"server-task-service-containous": { "server-app-taskID-service-containous": {
URL: "https://localhost:80", URL: "https://localhost:80",
Weight: 12, Weight: 12,
}, },
@ -678,21 +750,12 @@ func TestBuildConfigurationServices(t *testing.T) {
t.Run(test.desc, func(t *testing.T) { t.Run(test.desc, func(t *testing.T) {
t.Parallel() t.Parallel()
test.application.ID = "/app"
for _, task := range test.application.Tasks {
task.ID = "task"
if task.State == "" {
task.State = "TASK_RUNNING"
}
}
p := &Provider{ p := &Provider{
Domain: "docker.localhost", Domain: "marathon.localhost",
ExposedByDefault: true, ExposedByDefault: true,
} }
actualConfig := p.buildConfigurationV2(withApplications(test.application)) actualConfig := p.buildConfigurationV2(test.applications)
assert.NotNil(t, actualConfig) assert.NotNil(t, actualConfig)
assert.Equal(t, test.expectedBackends, actualConfig.Backends) assert.Equal(t, test.expectedBackends, actualConfig.Backends)
@ -858,7 +921,7 @@ func TestTaskFilter(t *testing.T) {
desc: "task not running", desc: "task not running",
task: task( task: task(
taskPorts(80), taskPorts(80),
state(taskStateStaging), taskState(taskStateStaging),
), ),
application: application(appPorts(80)), application: application(appPorts(80)),
expected: false, expected: false,
@ -884,8 +947,8 @@ func TestTaskFilter(t *testing.T) {
task: task(taskPorts(80, 81)), task: task(taskPorts(80, 81)),
application: application( application: application(
appPorts(80, 81), appPorts(80, 81),
withServiceLabel(label.TraefikPort, "80", "web"), withSegmentLabel(label.TraefikPort, "80", "web"),
withServiceLabel(label.TraefikPort, "illegal", "admin"), withSegmentLabel(label.TraefikPort, "illegal", "admin"),
), ),
expected: true, expected: true,
}, },
@ -894,7 +957,7 @@ func TestTaskFilter(t *testing.T) {
task: task(taskPorts(80, 81)), task: task(taskPorts(80, 81)),
application: application( application: application(
appPorts(80, 81), appPorts(80, 81),
withServiceLabel(label.TraefikPort, "81", "admin"), withSegmentLabel(label.TraefikPort, "81", "admin"),
), ),
expected: true, expected: true,
}, },
@ -1090,7 +1153,7 @@ func TestGetFrontendRule(t *testing.T) {
desc: "label missing", desc: "label missing",
application: application(appID("test")), application: application(appID("test")),
marathonLBCompatibility: true, marathonLBCompatibility: true,
expected: "Host:test.docker.localhost", expected: "Host:test.marathon.localhost",
}, },
{ {
desc: "HAProxy vhost available and LB compat disabled", desc: "HAProxy vhost available and LB compat disabled",
@ -1099,7 +1162,7 @@ func TestGetFrontendRule(t *testing.T) {
withLabel("HAPROXY_0_VHOST", "foo.bar"), withLabel("HAPROXY_0_VHOST", "foo.bar"),
), ),
marathonLBCompatibility: false, marathonLBCompatibility: false,
expected: "Host:test.docker.localhost", expected: "Host:test.marathon.localhost",
}, },
{ {
desc: "HAProxy vhost available and LB compat enabled", desc: "HAProxy vhost available and LB compat enabled",
@ -1119,7 +1182,7 @@ func TestGetFrontendRule(t *testing.T) {
}, },
{ {
desc: "service label existing", desc: "service label existing",
application: application(withServiceLabel(label.TraefikFrontendRule, "Host:foo.bar", "app")), application: application(withSegmentLabel(label.TraefikFrontendRule, "Host:foo.bar", "app")),
serviceName: "app", serviceName: "app",
marathonLBCompatibility: true, marathonLBCompatibility: true,
expected: "Host:foo.bar", expected: "Host:foo.bar",
@ -1131,7 +1194,7 @@ func TestGetFrontendRule(t *testing.T) {
t.Run(test.desc, func(t *testing.T) { t.Run(test.desc, func(t *testing.T) {
t.Parallel() t.Parallel()
p := &Provider{ p := &Provider{
Domain: "docker.localhost", Domain: "marathon.localhost",
MarathonLBCompatibility: test.marathonLBCompatibility, MarathonLBCompatibility: test.marathonLBCompatibility,
} }
@ -1161,7 +1224,7 @@ func TestGetBackendName(t *testing.T) {
}, },
{ {
desc: "service label existing", desc: "service label existing",
application: application(withServiceLabel(label.TraefikBackend, "bar", "app")), application: application(withSegmentLabel(label.TraefikBackend, "bar", "app")),
serviceName: "app", serviceName: "app",
expected: "backendbar", expected: "backendbar",
}, },

View file

@ -67,7 +67,7 @@ func TestBuildConfigurationV1(t *testing.T) {
desc: "filtered task", desc: "filtered task",
application: application( application: application(
appPorts(80), appPorts(80),
withTasks(localhostTask(taskPorts(80), state(taskStateStaging))), withTasks(localhostTask(taskPorts(80), taskState(taskStateStaging))),
), ),
expectedFrontends: map[string]*types.Frontend{ expectedFrontends: map[string]*types.Frontend{
"frontend-app": { "frontend-app": {
@ -271,11 +271,11 @@ func TestBuildConfigurationServicesV1(t *testing.T) {
withLabel(label.TraefikBackendMaxConnAmount, "1000"), withLabel(label.TraefikBackendMaxConnAmount, "1000"),
withLabel(label.TraefikBackendMaxConnExtractorFunc, "client.ip"), withLabel(label.TraefikBackendMaxConnExtractorFunc, "client.ip"),
withServiceLabel(label.TraefikPort, "80", "web"), withSegmentLabel(label.TraefikPort, "80", "web"),
withServiceLabel(label.TraefikPort, "81", "admin"), withSegmentLabel(label.TraefikPort, "81", "admin"),
withLabel("traefik..port", "82"), // This should be ignored, as it fails to match the servicesPropertiesRegexp regex. withLabel("traefik..port", "82"), // This should be ignored, as it fails to match the servicesPropertiesRegexp regex.
withServiceLabel(label.TraefikFrontendRule, "Host:web.app.marathon.localhost", "web"), withSegmentLabel(label.TraefikFrontendRule, "Host:web.app.marathon.localhost", "web"),
withServiceLabel(label.TraefikFrontendRule, "Host:admin.app.marathon.localhost", "admin"), withSegmentLabel(label.TraefikFrontendRule, "Host:admin.app.marathon.localhost", "admin"),
), ),
expectedFrontends: map[string]*types.Frontend{ expectedFrontends: map[string]*types.Frontend{
"frontend-app-service-web": { "frontend-app-service-web": {
@ -344,15 +344,15 @@ func TestBuildConfigurationServicesV1(t *testing.T) {
withLabel(label.TraefikBackendMaxConnAmount, "666"), withLabel(label.TraefikBackendMaxConnAmount, "666"),
withLabel(label.TraefikBackendMaxConnExtractorFunc, "client.ip"), withLabel(label.TraefikBackendMaxConnExtractorFunc, "client.ip"),
withServiceLabel(label.TraefikPort, "80", "containous"), withSegmentLabel(label.TraefikPort, "80", "containous"),
withServiceLabel(label.TraefikProtocol, "https", "containous"), withSegmentLabel(label.TraefikProtocol, "https", "containous"),
withServiceLabel(label.TraefikWeight, "12", "containous"), withSegmentLabel(label.TraefikWeight, "12", "containous"),
withServiceLabel(label.TraefikFrontendAuthBasic, "test:$apr1$H6uskkkW$IgXLP6ewTrSuBkTrqE8wj/,test2:$apr1$d9hr9HBB$4HxwgUir3HP4EsggP/QNo0", "containous"), withSegmentLabel(label.TraefikFrontendAuthBasic, "test:$apr1$H6uskkkW$IgXLP6ewTrSuBkTrqE8wj/,test2:$apr1$d9hr9HBB$4HxwgUir3HP4EsggP/QNo0", "containous"),
withServiceLabel(label.TraefikFrontendEntryPoints, "http,https", "containous"), withSegmentLabel(label.TraefikFrontendEntryPoints, "http,https", "containous"),
withServiceLabel(label.TraefikFrontendPassHostHeader, "true", "containous"), withSegmentLabel(label.TraefikFrontendPassHostHeader, "true", "containous"),
withServiceLabel(label.TraefikFrontendPriority, "666", "containous"), withSegmentLabel(label.TraefikFrontendPriority, "666", "containous"),
withServiceLabel(label.TraefikFrontendRule, "Host:traefik.io", "containous"), withSegmentLabel(label.TraefikFrontendRule, "Host:traefik.io", "containous"),
), ),
expectedFrontends: map[string]*types.Frontend{ expectedFrontends: map[string]*types.Frontend{
"frontend-app-service-containous": { "frontend-app-service-containous": {
@ -594,7 +594,7 @@ func TestGetFrontendRuleV1(t *testing.T) {
}, },
{ {
desc: "service label existing", desc: "service label existing",
application: application(withServiceLabel(label.TraefikFrontendRule, "Host:foo.bar", "app")), application: application(withSegmentLabel(label.TraefikFrontendRule, "Host:foo.bar", "app")),
serviceName: "app", serviceName: "app",
marathonLBCompatibility: true, marathonLBCompatibility: true,
expected: "Host:foo.bar", expected: "Host:foo.bar",
@ -637,7 +637,7 @@ func TestGetBackendV1(t *testing.T) {
}, },
{ {
desc: "service label existing", desc: "service label existing",
application: application(withServiceLabel(label.TraefikBackend, "bar", "app")), application: application(withSegmentLabel(label.TraefikBackend, "bar", "app")),
serviceName: "app", serviceName: "app",
expected: "backendbar", expected: "backendbar",
}, },

View file

@ -1,8 +1,7 @@
{{ $apps := .Applications }} {{ $apps := .Applications }}
[backends] [backends]
{{range $app := $apps }} {{range $backendName, $app := $apps }}
{{ $backendName := getBackendName $app }}
[backends."{{ $backendName }}"] [backends."{{ $backendName }}"]
@ -57,11 +56,11 @@
{{end}} {{end}}
[frontends] [frontends]
{{range $app := $apps }} {{range $backendName, $app := $apps }}
{{ $frontendName := getFrontendName $app }} {{ $frontendName := getFrontendName $app }}
[frontends."{{ $frontendName }}"] [frontends."{{ $frontendName }}"]
backend = "{{ getBackendName $app }}" backend = "{{ $backendName }}"
priority = {{ getPriority $app.SegmentLabels }} priority = {{ getPriority $app.SegmentLabels }}
passHostHeader = {{ getPassHostHeader $app.SegmentLabels }} passHostHeader = {{ getPassHostHeader $app.SegmentLabels }}
passTLSCert = {{ getPassTLSCert $app.SegmentLabels }} passTLSCert = {{ getPassTLSCert $app.SegmentLabels }}